Verified Document

Computer Network For Bistro Bookstore Computer Network Essay

Computer Network for Bistro Bookstore Computer Network Planning for Bistro Bookstore

Launching a new bistro and bookstore is going to require three specific tasks be completed to ensure the stability, security and continued reliability of the network which over time will become the backbone of the information system and infrastructure of the store. These three tasks include the development of the new network, defining and implementing best practices and procedures for ensuring security of the network and its contents from unauthorized access, and the definition and use of guidelines and strategies for managing the integration of technological and sociotechnical frameworks. Each of these three strategic areas of the Bistro Bookstore is analyzed in this paper.

Planning the Structure of the Network

As the Bistro Bookstore will have two businesses running concurrently, it will be critically important to have a very agile, secure and scalability network architecture. A star topology will be optimal given the store supporting both a small bistro that will serve coffee, cappuccinos, hot and warm drinks in addition to pastries and small lunches and the bookstore that will have a collection of fiction, nonfiction, travel and reference titles including a music section and travel reference section. The star topology will allow for highly distributed network architecture, with Wi-Fi Access Points anchored to specific department servers and printers for managing inventory position reports and sales-out data across the store from each register. The star topology is ideal for an agile, highly distributed networking model as the workloads are evenly distributed throughout the network as well (Hale, 2005).

In terms of the protocol, TCP/IP will provide the greatest flexibility in terms of configuration and the most effective levels of security. The TCP/IP command set and associated protocols will also ensure the network within the Bistro is plug-compatible with the network adapters, routers, hubs, switches and servers that will anchor the network. The TCP/IP protocol is the most pervasively supported and secure of all protocols in low-cost networking and connectivity devices (Potter, 2006). TCP/IP also supports...

A DHCP address checked out to a given device can be limited to as little as six hours of use, to 24 hours in the Window Server operating system (Leroy, Detal, Cathalo, et.al., 2011). This is very valuable for the Bistro, as it can assign long-term subnet mask leases to one specific series of devices used by the store while having an entirely different group dedicated to the customers' devices and free Wi-Fi which will be offered in the store. The TCP/IP protocol can be configured for peer-to-peer connections, which will also enable greater levels of file and transaction sharing and reporting throughout the store. Using the peer-to-peer protocol throughout the store will also make the DHCP-based protocol more effective in streamlining device integration and sharing of customers as well. All of these benefits accrue from creating a network based on the TCP/IP protocol running the DHCP network address allocation features. These features will also enable a much more effective level of security and scalability of the network over the long-term as well (Lehr, McKnight, 2003). Best of all, it will also create a platform for highly effective network security for the store and public systems that customers will be able to sue for accessing the Internet for free while visiting the Bistro and store shelves.
Procedures for Securing and Maintaining Networks

The Bistro Bookstore needs to have a well-defined and executed security and maintenance plan for its networks and systems that are supporting their operations. The most critical areas of creating a security plan and strategy for a given business include perimeter security, communications security, secure networking, platform security, access security and physical security (Keller, Powell, Horstmann, Predmore, Crawford, 2005). Each of these six areas are critical for the security, stability and reliability of the network, and need to also be included in the tactical and strategic plans pertaining to limiting Wi-Fi…

Sources used in this document:
References

Hale, Robert V.,,II. (2005). Wi-Fi liability: Potential legal risks in accessing and operating wireless internet. Santa Clara Computer and High - Technology Law Journal, 21(3), 543-559.

Keller, S., Powell, A., Horstmann, B., Predmore, C., & Crawford, M. (2005). Information security threats and practices in small businesses. Information Systems Management, 22(2), 7-19.

Lehr, W., & McKnight, L.W. (2003). Wireless internet access: 3G vs. WiFi? Telecommunications Policy, 27(5), 351-370.

Leroy, D., Detal, G., Cathalo, J., Manulis, M., Koeune, F., & Bonaventure, O. (2011). SWISH: Secure WiFi sharing. Computer Networks, 55(7), 1614.
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Network Security Issues Computer
Words: 1894 Length: 6 Document Type: Research Paper

In some instances, policies implemented mainly as cost-effective shortcuts to network system security have cost otherwise good employees their jobs for violations of excessively restrictive network use policies. In the realm of the home computer user, it is possible to buy many new redundant or unnecessary security programs and features. Generally, appropriate network security should not interfere noticeably with either personal home computer use or computer system use in

Computer Network Security -- Information
Words: 588 Length: 2 Document Type: Essay

Discussion Question 2 - Security Awareness Training and IA Training In general, security awareness training consists of periodic classes and online tutorials and related quizzes that promote understanding of the nature of different types of threats to information security (Boyce, 2008; Kizza, 2009). That training addresses threats in the nature of malicious intrusion from external entities, malicious intrusion and misuse of information access or system credentials from the inside; and malicious

Computer Networks Understood. Please Start Reviewing Articles
Words: 928 Length: 3 Document Type: Essay

computer networks understood. Please start reviewing articles discussing stranger requests received IT personnel: Jennifer Mears & Denise Dubie, Funny tech support stories, CD-ROM coffee holders, homemade cookies, frozen computers, The seven most important things about computer networks that should be understood by everyone who uses one Principle one: Know how to 'talk the talk' In the article "They've heard them all," two of the most humorous stories detailing naive users' confusion about

Computer Networks Are Changing
Words: 383 Length: 1 Document Type: Essay

Computing networks are certainly changing. There are a couple of different factors driving these changes, which generally include issues of security, privacy, regulatory concerns, and technological advancements. For the most part, these drivers are resulting in positive changes for computer networks. One of the fundamental ways in which computer networks are changing is that they are incorporating Virtual Private Networks (VPNs). VPNs provide an additional computing network inside of an external

Computer Networks and Terrorism
Words: 2546 Length: 8 Document Type: Research Paper

Cyber Terrorism: The Greatest Risk in the U.S. Tremendous technological advancements have been made in the last few decades. Today, humans depend more on computer networks and information technology (IT) systems than on other means for information. From business to government, computer networks are relied upon to store, process, retrieve, and transfer critical information. Increased dependence on computer networks has, however, posed a major threat. Cyber terrorism is now arguably the

Computer Network
Words: 442 Length: 1 Document Type: Term Paper

Networking This report is a follow up to troubleshoot the multimillion-dollar life insurance firm Evco Insurance's corporate headquarters network. "Complex, converged, global networks are the critical underpinnings to today's business processes, communications, and productivity enabling applications." (Networkscouts.com) Initial information provided implies that there are network communication congestion problems and the marketing director stated that at some points of the day there can be 10 minute lags for emails. The Marketing Department

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now